Silicon Systems Security and Building a Root of Trust

被引:0
作者
Perez, Ronald [1 ]
机构
[1] Rambus Cryptog Res Div, San Francisco, CA 94105 USA
来源
2015 IEEE ASIAN SOLID-STATE CIRCUITS CONFERENCE (A-SSCC) | 2015年
关键词
System Security; Hardware Root of Trust;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper briefly presents a position that hardware-based roots of trust, integrated in silicon with System-on-Chip (SoC) solutions, represent the most current stage in a progression of technologies aimed at realizing the most foundational computer security concepts. A brief look at this historical progression from a personal perspective is followed by an overview of more recent developments, with particular focus on a root of trust for cryptographic key provisioning and SoC feature management aimed at achieving supply chain assurances and serves as a basis for trust that is linked to properties enforced in hardware. The author assumes no prior knowledge of these concepts and developments by the reader.
引用
收藏
页码:5 / 8
页数:4
相关论文
共 8 条
  • [1] Anderson J.P., 1972, Computer security technology planning study, V2
  • [2] [Anonymous], 2013, PROC HASP ISCA
  • [3] [Anonymous], 2013, 2 ACM INT WORKSHOP H
  • [4] Building the IBM 4758 secure coprocessor
    Dyer, JG
    Lindemann, M
    Perez, R
    Sailer, R
    van Doorn, L
    Smith, SW
    Weingart, S
    [J]. COMPUTER, 2001, 34 (10) : 57 - +
  • [5] Hoekstra M., 2013, P 2 INT WORKSH HARDW, P1
  • [6] AUTHENTICATION IN DISTRIBUTED SYSTEMS - THEORY AND PRACTICE
    LAMPSON, B
    ABADI, M
    BURROWS, M
    WOBBER, E
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1992, 10 (04): : 265 - 310
  • [7] Rushby JohnM., 1981, Design and verification of secure systems, V15
  • [8] Standard DoD, 1985, 520028 DOD